Your SlideShare is downloading. ×

Cybersecurity

440

Published on

Presented at the …

Presented at the
LECET Information Technology Conference
Washington, DC
May 2, 2012
by Carrie S. Leary, Ann Arundel Community College

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
440
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
31
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Background about Industry
  • What is missing is a skilled competent workforce to fill all of the open job. Far more than we have applicants to pursue
  • Why do we need so many? Let’s talk about the changes that have occurred in the industry and how the landscape has changed.
  • What is missing is a skilled competent workforce to fill all of the open job. Far more than we have applicants to pursueWe are not able to develop technology as fast as neededNeed to get individual users to feel accountable and practice safe security
  • Biggest threats come from within the organization – not following polices and guidelines
  • Technology is now so accessible to so many# of connected device – storage, analytics, and security to protect against robust threats
  • What does your phone know about you? What are you giving it access to?
  • Only download apps from trusted sources, such as reputable app stores and download sites. Remember to look at the developer name, reviews, and star ratings.After clicking on a web link, pay close attention to the address to make sure it matches the website it claims to be if you are asked to enter account or login information.Set a password on your mobile device so that if it is lost or stolen, your data is difficult to access.Download a mobile security tool that scans every app you download for malware and spyware and can help you locate a lost or stolen device. For extra protection, make sure your security app can also protect from unsafe websites.Be alert for unusual behaviors on your phone, which could be a sign that it is infected. These behaviors may include unusual text messages, strange charges to the phone bill, and suddenly decreased battery life.Make sure to download firmware updates as soon as they are available for your device.
  • Handing over trustMost valuable thing to a company is their data
  • Transcript

    • 1. CybersecurityLECET Information Technology Conference | May 2, 2012 Carrie Leary | Anne Arundel Community College
    • 2. Background AACC CyberWatch OrganizationsCenter of Academic Advanced Technological Public & Private Sectors Excellence Education Center Curriculum AAS Degree in ResearchInformation Assurance & Cybersecurity K-12 Training Training Certificates Professional Development Network Security Server Administration CISCO Networking Collegiate Cybersecurity Awareness Forensic Defense Competitions
    • 3. What is Cybersecurity? Defined as… Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack - Merriam-Webster The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this -Oxford Dictionaries
    • 4. What are the needs?96,600 Network & Computer System Administrators 65,700 Information Security Analysts110,000 Computer Support Specialists 120,000 Computer Systems Analysts Bureau of Labor Statistics | Employment Change 2010 - 2020
    • 5. The Problem Current IT WorkforceWorkforce Graduates Needs
    • 6. Identifying the Workforce Information Technology (IT) jobs found in every industry and across numerous job functions Lack of job training and skills Pending baby boom retirements Lack of interest in STEM fields Lack career info
    • 7. 1986 - 1996
    • 8. 2000 - 2004
    • 9. 2004 - 2008
    • 10. 2009 - current
    • 11. Why worry?Our Nation Organizations Individuals Loss of Intelligence  Loss of Data  Identity Theft Critical  Reduced  Financial Loss Infrastructure/ Productivity  Inconvenience Power Grid  Financial Loss  Loss of Trust by Customers  Bankruptcy
    • 12. The Problem Current IT WorkforceWorkforce Graduates Needs
    • 13. Avoid Weak Passwords
    • 14. Accessing the Internet
    • 15. Accessing the InternetChoose your browser carefully.Select Google Chrome, MozillaFirefox, of Safari if possible.Keep Web Browser up-to-date.Install patches as they are releasedUse secure websites.Look for “https” when transmittingconfidential information.Never click links.Always type the web addressdirectly into the address bar.
    • 16. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
    • 17. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
    • 18. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
    • 19. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
    • 20. Evolving Infrastructure We continue to embrace new technology  Mobile Device  Virtualization  Cloud Computing Need a workforce versed in specific technical knowledgeAs the number of the need for data security to defend storage needs willconnected devices analytics will against robust threats increase, increases increase, and will be essential
    • 21. Be Smart with your Smartphone Only connect to protected WiFi Be vigilant when clicking web links Use a complex password Keep firmware updated Only download apps from trusted sources Pay attention to the data the phone is accessing
    • 22. Cloud Computing Built on TRUST!
    • 23. Cloud Computing – Know what to askSystem Downtime Encryption of data Disaster Recovery Data Retention Policy (in transit and at rest) Plan Data Integrity Identity and Access Regulatory Location of Data Assurance Management Compliance Centers/ Physical Security
    • 24. Moving Forward Awareness and Training are essential! Resources • Stay Safe Online http://www.staysafeonline.org/ • National Institute of Standards and Technology (NIST) www.nist.gov • National Initiative for Cybersecurity Education (NICE)http://csrc.nist.gov/nice/ • CyberWatch ATE Center www.cyberwatchcenter.org • Cyber Maryland http://www.cybermaryland.org/
    • 25. Questions?Carrie Leary | csleary@aacc.edu | 410-777-7088
    • 26. Resources Stay Safe Online http://www.staysafeonline.org/ National Institute of Standards and Technology (NIST) www.nist.gov National Initiative for Cybersecurity Education (NICE) http://csrc.nist.gov/nice/ CyberWatch www.cyberwatchcenter.org Cyber Maryland http://www.cybermaryland.org/
    • 27. Resources http://www.intel.com/content/www/us/en/communications/inte rnet-minute-infographic.html http://www.confidenttechnologies.com/infographic http://www.makeuseof.com/tech-fun/the-only-thing-internet- explorer-is-good-for/

    ×